SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does User Rights policy governs?
Certain firewall rules configured for the Peer Discovery and Content Retrieval.
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
Windows Aero was revised to be more touch-friendly.
Who can shutdown a computer
2. How do you need to configure the NAP enforecment points if using in conjenction with NPS?
Se a capture filter based on the mac address of the problem PC.
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
Configure the enforcement points as RADIUS clients.
It contains new capabilities and extensions that you can: Define rules based on file attributes - Create exceptions to rules - Import and export rules - and use audit-only mode.
3. What does MISEXEC.EXE do?
By running the Update Status summary report.
Increase the SOA refresh interval parameter.
Also known as root scalability mode. Allows organizations with more than 16 namespace servers use consistency mode. They poll the nearest dc every hour instead of the pdc emulator. This reduces network traffic to the pdc emulator but clients might ha
Install Windows Installer Packages (.MSI) files. You can script the installation.
4. How do you calculate the original subnet mask of a network that was divided in to multiple networks?
On the zone file of the DNS server in the DNS manager.
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
EAP protocol.
5. What is terminal server network level authentication?
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
Which processes currently consume a resource like processor utilization.
The requesting of user authentication prior to connecting to the terminal server. This completes the user aoth before reaching the logon screen making the server more secure. This helps fight Denial of Service attacks - malicious users/software.
They must be configured with the ip addresses of the radius server.
6. How do you test the ip connectivity on IPV6?
Ping the Link Local Address (FE80 Address)
They are in the first 48 bits /48
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
7. What protocol does Ping uses?
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
Who can shutdown a computer
The ICMP protocol.
It backs up digitally identities to a password protected file.
8. What is File Server Resource Manager?
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
You add it back to a DNS zone - clear the server DNS cache and clients DNS cache.
Encapsulating Security payload protocol used for encryption the packets created by the AH.
Yes
9. You can still ___________ if root hints are disabled.
Use IPV6 Unique Local Addresses.
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
Forward to another DNS server
Us edit dnscmd /zoneupdatefromdns command.
10. What does importing and exporting rules affect?
ISATAP - Teredo and 6to4
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
Restrict when a child can logon to a computer.
11. What is the difference between MSCHAP2 and EAP-TLS?
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
Can be used to create virtual hard disks
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Configure aging and scavenging.
12. What is DirectAccess?
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
L2TP/IPSEC with EAP-TLS.
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
13. What is Drvload?
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
Devices and Printers Control Panel applet has a
14. What is exFAT?
Use AD integrated zones so the clients can update to more than one DNS server.
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
It is the authentication header protocol and digitally sign packets but not encrypt them.
15. What does dnscmd /zoneadd dsprimary do?
Sett up a priority for the preferred smtp server.
Add an AD integrated zone
Use WPA with AES encryption. WPA-Personal requires a preshared key and WPA-Enterprise uses Radius Authentication.
Setup a GlobalNames zone.
16. How do you install RRAS?
Can be used to create virtual hard disks
Use the Import Foreign Disk option on the target computer
From the Network Policy Access Services role in system manager.
Windows 7 Ultimate.
17. Active directory DNS ____ replicate between forests.
Command line equilivant of Server Manager. You can install/remove roles and features on server 2008?
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
Does not
18. What is Bootsect.exe?
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
Migrates EFS encrypted files?
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that - the content in that folder is automatically indexed.
19. What is a ns record?
It designates an authoritative DNS server - not the soa record.
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
The domain profile not the public or private.
Send email notifications
20. How do you enable a recovery agent?
Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
Drop both inbound and outbound traffic
21. How do you restore a System Image from backup?
Windows Aero was revised to be more touch-friendly.
3389
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
22. How do you block all traffic for a specific port in windows firewall?
Configure a firewall rule to the specific port and block all connections.
DHCP server cannot assign an ip address
Increase the SOA refresh interval parameter.
Duplicate file identification - disk usage patterns - dormant files identification - and audit screening.
23. How do you setup Ready Boost?
A LAN Router only or a LAN to WAN Router
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
Command line equilivant of Server Manager. You can install/remove roles and features on server 2008?
24. How do you setup a DHCP server for redundancy?
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
4 (bits 49 - 52) /52 Allows for 16 regions.
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
25. What does DISM /UNMOUNT-WIM /COMMIT do?
dynamic drives
Disable AutoComplete in Internet Explorer
It is the max size is expressed in megabytes.
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
26. How do you create a VPN connection?
Use the "Connect to a Workplace" option
Contains a list of dynamically updated list of authorities for the zone.
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
A type of port forwarding that allows public network computers on a Private network through nat devises.
27. How do you allow specific vendors for being excluded from a GPO to prevent all removable storage devices?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
28. What does WINRM QUICKCONFIG do?
Enforce IPSEC on the network
A CONFIG.XML file
Yes
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
29. How should EFS files should be recovered?
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
WPA2 and 802.1x but require EAP-TLS to be enable.
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
30. What is another way to deploy an application compatibility database across multiple computers?
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
Use the BCDEDIT.EXE command
Use dnscmd /recorddelete
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
31. How can you can upgrade an offline image's Windows 7 edition?
Run scripts
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
WPA2 and 802.1x but require EAP-TLS to be enable.
32. What windows 7 OSs can join a domain?
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
A network location.
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
33. What does Scanstate /OfflineWinOld: C:Windows.old do?
No they are disabled
Perform an offline migration
Can be used to create virtual hard disks
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
34. How do you setup DNS single label (unqualified) name resolution?
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Setup a GlobalNames zone.
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
Only sites added to the local Intranet Zones
35. What is AppLocker?
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
They can place quotas on folders/volumes - activity screen files - and generate comprehensive storage reports. This assists in not only monitoring existing resource but helping on future planning.
They need to be configured us use 802.1x RADIUS authentication
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
36. What OSs are all Windows Games installed on?
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
Windows 7 Enterprise and Ultimate Editions
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
37. How do you prevent Forms Based Credentials from being saved?
Disable AutoComplete in Internet Explorer
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
Used to get a list of installed 3rd party drivers
38. How do you repartition your hard disk by using the Shrink feature in Disk Management?
By the RRAS manager or from the command line. For the subnet you can either use the / command or the octet subnet. Example: Route -p add 192.168.1.0/24 192.168.1.1
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
1723
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
39. What OSs support SSTP?
Vista SP1 and Server 2008 and above.
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
It is submitted to Microsoft for "device signing" to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However n
By using the dnscmd /zoneexport command.
40. How many bits are in the regional prefix?
SSL
Cannot be in different domains
Does not have
4 (bits 49 - 52) /52 Allows for 16 regions.
41. What do Print permission only allows?
Delegate permission by configuring the dacl of the zone file.
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Yes - it can be modified to apply to a network location.
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
42. How do you decrease zone transfer traffic?
wbadmin.exe. This can backup critical files.
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
Increase the SOA refresh interval parameter.
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
43. What are soft disk quotas?
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
It is submitted to Microsoft for "device signing" to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However n
They are monitored but not enforced. Users can exced there quota limit.
44. How do you configure client computers to use a WSUS server as the source for Windows Update?
Modify/Create a GPO
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
45. What are Libraries?
L2TP/IPSEC with EAP-TLS.
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
By creating or modifying a wireless connection in Network and Sharing Center.
To display friendly labels to capture packet address headers.
46. What does running network monitor in PMode do?
Use Safe Mode and then roll back the driver if it was recently updated.
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
47. What is InPrivate Browsing?
Use SYNC Center
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
Suggested Sites
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
48. How are RRAS/NPS policies evaluated?
Set IE back to its default settings
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
On a core server
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
49. What is BranchCache?
On a core server
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
50. What is a HOSTS file?
The requesting of user authentication prior to connecting to the terminal server. This completes the user aoth before reaching the logon screen making the server more secure. This helps fight Denial of Service attacks - malicious users/software.
Use it to can backup certificates to a .PFX file that is password protected.
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
A file that can be used to perform FQDN name resolution in the absence of a DNS server.